Category | Details |
---|---|
Threat Actors | – Rostislav Panev (dual Russian-Israeli national, LockBit developer) – LockBit ransomware group – Other members: Dmitry Khoroshev, Mikhail Vasiliev, Ruslan Astamirov, Artur Sungatov, Ivan Kondratyev, Mikhail Matveev |
Campaign Overview | – Panev developed LockBit infrastructure enabling global ransomware attacks. – LockBit has targeted 1,800+ U.S. victims and thousands globally, netting $500M+ in ransoms and causing billions in damages. |
Target Regions | – Over 120 countries targeted globally, including the U.S., Europe, and critical infrastructure sectors worldwide. |
Methodology | – Development of malware to disable antivirus, deploy ransomware, and print ransom notes. – Use of dark web tools for attack coordination. |
Product Targeted | – Hospitals, schools, critical infrastructure, and multinational corporations. |
Malware Reference | – LockBit ransomware – LockBit builder (used to generate custom ransomware). |
Tools Used | – Malware builder tools – LockBit control panel – Source codes for multiple LockBit versions. |
Vulnerabilities Exploited | – Not explicitly mentioned, but infrastructure vulnerabilities exploited to disable antivirus and deploy ransomware. |
TTPs | – Malware development and deployment. – Dark web dashboard for coordinating attacks. – Double extortion: exfiltration and encryption. |
Attribution | – Panev, alongside other LockBit associates, directly linked to the group’s operations. |
Recommendations | – Enhance cybersecurity defenses with EDR and antivirus solutions. – Regularly update and patch systems. – Monitor dark web activity for threats. |
Source | Hackread |
Read full article: https://hackread.com/lockbit-developer-rostislav-panev-russia-israel-arrested/
The above summary has been generated by an AI language model
Leave a Reply